[1] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[2] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[3] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[4] |
.
Extended codes of several classes of linear codes and their applications in secret sharing
[J]. Computer Engineering & Science, 2022, 44(12): 2134-2139.
|
[5] |
CUI Chen-yu, ZHANG Li-na, .
A threshold multi-secret sharing scheme with identity lock
[J]. Computer Engineering & Science, 2022, 44(08): 1382-1391.
|
[6] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(06): 1030-1036.
|
[7] |
NIU Shufen, WANG Jinfeng, WANG Bobin, CHEN Jingmin, DU Xiaoni.
A searchable encryption scheme supporting multi-keyword retrieval on blockchain
[J]. Computer Engineering & Science, 2020, 42(11): 2005-2012.
|
[8] |
ZHOU Jing,CHEN Chen.
A data security model based on heterogeneous network
[J]. Computer Engineering & Science, 2019, 41(12): 2160-2165.
|
[9] |
WANG Cai-fen1,2,SU Shun-chang1,YANG Xiao-dong1.
A dynamically updated password
authorization multi-secret sharing scheme
[J]. Computer Engineering & Science, 2019, 41(09): 1597-1602.
|
[10] |
QIAN Zheng1,2,XIA Hongxia2.
Remote audit of big data cloud storage based on
finite field algebraic signature partition table
[J]. Computer Engineering & Science, 2018, 40(11): 1907-1914.
|
[11] |
FU Wei1,LI Moci2,ZHAO Huarong2,WU Yong2.
CRSHE: A novel ciphertext retrieval scheme
based on homomorphic encryption
[J]. Computer Engineering & Science, 2018, 40(09): 1540-1545.
|
[12] |
YANG Xiaodong,YANG Miaomiao,LIU Tingting,WANG Caifen.
A multi-domain access control scheme based on
multi-authority attribute encryption for cloud storage
[J]. Computer Engineering & Science, 2018, 40(07): 1192-1198.
|
[13] |
JIANG Xiao-ping,ZHANG Wei,LI Cheng-hua,ZHOU Hang,SUN Jing.
A document similarity calculation method based on fully
homomorphic encryption technology for cloud storage
[J]. Computer Engineering & Science, 2017, 39(10): 1807-1811.
|
[14] |
WANG Yan,WANG Jin-kuan.
A dynamic replication placement
mechanism in cloud storage
[J]. Computer Engineering & Science, 2017, 39(09): 1581-1587.
|
[15] |
ZHANG Zhi-xin1,WANG Chun-dong2,JIANG Shu-hao1.
Integrity check of cloud storage threat model based
on pseudo random bilinear mapping
[J]. Computer Engineering & Science, 2017, 39(06): 1048-1055.
|